Nothing about new NSA leaks?

Nothing about new NSA leaks?
That's what I thought.
Sup Forums is beyond saving at this point...

Other urls found in this thread:

gitlab.itunix.eu/skorotkiewicz/Hive
thehackernews.com/2017/11/cia-hive-malware-code.html?m=1
twitter.com/SFWRedditVideos

Post it CIA nigger

Im really tired

Tried that, and Sup Forums gave 0 fucks.
After that my google account updated without permission.
Fuck you for not even being able to visit wikileaks yourself.

mirror

gitlab.itunix.eu/skorotkiewicz/Hive

also,
fuck you Sup Forums

you first

Sup Forums - Consumerism

Bump

& GLOW IN THE DARK CIA NIGGERS

>US law enforcement can see what's on my computer
>and acquire things that are inadmissable in anything but millitary court

ohno

What is the patriot act

Try again

It's in wikileaks vault8 repo you dumb fuck. The cert is in another place but still on wikileaks server.

Moot sold Sup Forums to the NSA.

u should of included a OP with traps in it

Sup Forums loves traps and anime

who cares

Let this thread die

I barely know C but the code looks nice and it's well documented.

Interested in the vpn proxying code

How come none of these Vault8 threads take off? Isn't this the first time full source has been released for a USAINT program?

Because nobody gets paid to reply to these threads. *Ekhm... Apple ...Ekhm*

>Getting autistic because nobody is talking about leaks that you didn't even link to
What does it even do?

Eat dick

Because nobody knows what to do with it

Fucking kids...

>GUYS GUYS GUYS the NSA is SPYING on US!!!!!
wow who knew, what are you going to do next, find fish in water?

what is parallel construction

>Sup Forums can't use search engines
that makes a lot of sense actually

What do these do?

I hate you so much...

thehackernews.com/2017/11/cia-hive-malware-code.html?m=1

If AngelFire disguises itself as 'svchost.exe' isn't it trivial to count the svchost instances and find it that way? I know how many services I have running, so counting them in taskmgr adds up.

Im puzzled why they don't hide it completely using any method rootkits have been using for years.

A L P H A B E T
L
P
H
A
B
E
T

>CIA NSA ETC ARE CALLED THE ALPHABET AGENCIES
>GOOGLE LITERALLY RESTRUCTURES ITSELF INTO A HOLDING COMPANY NAMED ALPHABET

WHAT SPECIFICALLY DID THE BOTNET LITERALLY MEAN BY THIS?

In what way is this news? We all know our favourite three-letter government agencies are spying on us by having undisclosed knowledge of a wide array of exploits and backdoors for pretty much every OS and software package there is.
I guess this is new because we didn't know they had a central control for their malware and now we even have the sauce for it?
Or because this is new ammunition for those of us looking to redpill normalfags on botnet?
Pls explain to brainlet

>make thread saying 'fuck Sup Forums'
>surprised nobody posts in thread
idiot

People will be able to detect the software on their machines with this information.

Most normies don't even have a clue that their computers aren't secure. This is news.

ITS OLD SHIT ANYWAY, THEY GOT NEW SHIT

>CYBER SECURITY
KEK NOT EVEN AIRGAP CAN STOP IT, FORGET ABOUT NORTON

THE DANGER IS LESS NSA NIGGERS THAN SOME RANDOM FUCKWAD STUMBLES ONTO THE VULNS THEY USE, AKA WIKIFAGGOT LEAKING THEIR METHODS IS GIVING ASSHOLES IDEAS

I have never heard such agencies referred to as alphabet agencies, and from looking it up the term mostly refers to New Deal relief agencies, not security and intelligence agencies.

Python with ctypes stuff. Uses nginx to handle proxying connections to cover server or honeycomb/tool handler based on PKI authentication of data. Blot proxy (can't find) checks for destination in the HELLO SSL packet.

Server/client uses twofish and polarssl and can run on Microtik/Solaris/Linux/Windows (Microtik is a router OS). Basic file upload/download and command execution plus self-delete based on timer.

I quickly skimmed the .c and .py files I found interesting, but the documentation/DevelopersGuide/DevelopersGuide.pdf file has a good overview of the relevant stuff. There didn't seem to be extensive size checks and there were a few strcpy/strncpy calls, but I didn't look for any bugs.

Interestingly, a 466 byte trigger packet in ICMP format is always used so there is a simple NIDS IoC for this.

Never mind about the ICMP trigger packet, looks like that was fixed in the latest version.

>being this buthurt on the internet

It was last updated in 2014 so it's not really that old. Now that you have source code you can alter this stuff and pretend to be CIA.